A malicious marketing campaign focusing on Android gadgets worldwide makes use of 1000’s of Telegram bots to contaminate gadgets with SMS-stealing malware and steal one-time 2FA passwords (OTPs) for over 600 providers.
Zimperium researchers found the operation and have been monitoring it since February 2022. They report discovering not less than 107,000 distinct malware samples related to the marketing campaign.
The cybercriminals are motivated by monetary achieve, almost definitely utilizing contaminated gadgets as authentication and anonymization relays.
Telegram entrapment
The SMS stealer is distributed both via malvertising or Telegram bots that automate communications with the sufferer.
Within the first case, victims are led to pages mimicking Google Play, reporting inflated obtain counts so as to add legitimacy and create a false sense of belief.
On Telegram, the bots promise to present the consumer a pirated utility for the Android platform, asking for his or her cellphone quantity earlier than they share the APK file.
The Telegram bot makes use of that quantity to generate a brand new APK, making personalised monitoring or future assaults attainable.

Supply: Zimperium
Zimperium says the operation makes use of 2,600 Telegram bots to advertise numerous Android APKs, that are managed by 13 command and management (C2) servers.
A lot of the victims of this marketing campaign are situated in India and Russia, whereas Brazil, Mexico, and the USA even have important sufferer counts.
Producing cash
Zimperium discovered that the malware transmits the captured SMS messages to a particular API endpoint on the web site ‘fastsms.su.’
The positioning permits guests to buy entry to “digital” cellphone numbers in international international locations, which they’ll use for anonymization and to authenticate to on-line platforms and providers.

Supply: BleepingComputer
It is vitally seemingly that the contaminated gadgets are actively utilized by that service with out the victims realizing it.
The requested Android SMS entry permissions permit the malware to seize the OTPs required for account registrations and two-factor authentication.

Supply: Zimperium
BleepingComputer has contacted the Quick SMS service to ask about Zimperium’s findings, however a response wasn’t out there by publication.
For the victims, this could incur unauthorized costs on their cell account, whereas they could even be implicated in unlawful actions traced again to their gadget and quantity.
To keep away from cellphone quantity abuse, keep away from downloading APK information from exterior Google Play, don’t grant dangerous permissions to apps with unrelated performance, and guarantee Play Defend is energetic in your gadget.
